Why Are We Stuck in Groundhog Day When it Comes to Compromised Credentials?

Logo
Presented by

Ted Kietzman, Product Marketing Manager, Cisco Duo

About this talk

At this point, the fact that 80% of breaches can be traced back to compromised credentials seems to be a security industry constant. It’s like the speed of light. Year in, year out – it holds steady. But things have changed over time — there have been advances in authentication technology from stricter forms of MFA to federation to passkeys. Some of these advances are difficult to understand, but at Duo, we aim to make security simple. From small start-ups to large enterprises, our user-friendly security protects every click, every connection, every time. We’ve got you. In this session, we’ll dive into the trends behind the compromised credentials statistic – and discuss a new paradigm to address this common identity-based threat.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (98)
Subscribers (18900)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.